|Publication number||US20090149203 A1|
|Application number||US 12/001,288|
|Publication date||Jun 11, 2009|
|Filing date||Dec 10, 2007|
|Priority date||Dec 10, 2007|
|Also published as||US8364181, US8738050, US20130191476|
|Publication number||001288, 12001288, US 2009/0149203 A1, US 2009/149203 A1, US 20090149203 A1, US 20090149203A1, US 2009149203 A1, US 2009149203A1, US-A1-20090149203, US-A1-2009149203, US2009/0149203A1, US2009/149203A1, US20090149203 A1, US20090149203A1, US2009149203 A1, US2009149203A1|
|Inventors||Ari Backholm, Lauri Vuornos|
|Original Assignee||Ari Backholm, Lauri Vuornos|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (5), Referenced by (32), Classifications (6), Legal Events (3)|
|External Links: USPTO, USPTO Assignment, Espacenet|
1. Field of the Invention
The present invention relates to electronic mail. More specifically, the present invention relates to electronic-mail filtering for mobile devices.
2. Description of Related Art
Electronic-mail (e-mail) is a common method for transmitting messages over electronic communication systems. E-mail messages may be received and stored by an e-mail server, which may then forward the messages to a computing device associated with a recipient. Various e-mail programs allow for the messages to be sorted in an inbox and/or various folders designated by the recipient.
E-mail is also a common method for transmitting unsolicited messages. Unsolicited e-mail messages may also be referred to as unsolicited commercial e-mail, bulk e-mail, junk e-mail, or spam. Presently, spam messages may be sent in such overwhelming numbers as to make it difficult to find messages that are actually desired by the recipient. Various spam filters are available for preventing spam from being forwarded to and cluttering the recipient's inbox. Spam filters may identify an e-mail message as spam and then automatically delete or reject the message.
Some spam filters may direct spam into a specific folder for spam (e.g., a quarantine folder) instead of the e-mail inbox. The spam folder allows for the recipient to review a message to ensure that the message was correctly identified as spam by the spam filter before subsequently processing the same as a spam filter may incorrectly identify a commercial e-mail message as spam. For example, some commercial e-mail messages may be desired by the recipient. An individual may choose to subscribe to receive various commercial e-mail messages concerning topics of interest. In some cases, a spam filter may mistakenly identify desired messages as spam and filter out or delete these messages.
The problem of inbox clutter and reviewing messages in a quarantine folder is magnified when an individual chooses to forward incoming e-mail to a mobile device. Mobile devices make it possible for the user to receive and respond quickly to urgent, time-sensitive, or other types of messages desirable to the user when away from a personal computer. While the size of mobile devices makes their use and portability convenient, small size also presents some disadvantages. For example, because the display on mobile devices may be small, it is inconvenient for a recipient to visually browse through a cluttered inbox crowded with unidentified spam, commercial e-mail messages, and various other e-mail messages that may not be desirable to the recipient. The size of mobile devices may also make it difficult and inconvenient for the user to create e-mail filters, even if the user is knowledgeable enough to do so.
A further inconvenience of a mobile device is that the user may have to manually reconfigure the filter to reflect updated information or requirements. For example, the user may wish to adjust the filter to allow e-mail messages from a new contact to be sent to the mobile device belonging to the user. The user may need to add the contact to a contacts list, reconfigure the filter, and/or a combination of the foregoing for each e-mail account. Further, the user must use the smaller-than-normal keypad on the mobile device. The user may also have to make such data entries ‘on the go’ as the user is moving from meeting-to-meeting by foot or by some other conveyance. Being on-the-go only complicates data entry on a smaller than normal data entry device.
Other common-place factors in the mobile device world make repeated reconfiguration experiences even more inconvenient. For example, the use of a ‘triple-tap’ keypad may require multiple depresses of a single key to enter a single letter or number. Many devices utilize small display screens, which may make review of entered data difficult. The need to access more than one account (e.g., personal and work e-mail), limited time to access an account (e.g., only a few minutes before a lengthy meeting), and the need to have access to new data in near real-time further evidence the difficulties encountered with repeated reconfiguration.
There is, therefore, a need in the art for improved electronic-mail filtering for mobile devices.
Exemplary systems and methods of the present invention provide for dynamic electronic-mail filters for mobile devices. Incoming e-mail messages are received and provided to an e-mail inbox associated with the intended recipient. Those e-mail messages are evaluated to determine whether they may be desirable to the recipient. Desirability of an e-mail may be determined by such factors as the e-mail address of origin or key words in subject line. E-mail messages determined to be desirable are provided to a mobile device associated with the recipient. The recipient may then be notified concerning the desirable messages.
Various embodiments of the present invention include methods for dynamic electronic-mail filters for mobile devices. The methods include receiving an e-mail message addressed to a user of a mobile device, providing the e-mail message to an e-mail inbox, and evaluating the message to determine desirability. If the message is determined to be desirable, a copy of the desirable message is provided to the mobile device associated with the user, along with notification that the message is desirable. A message may be found desirable if the sender e-mail address is found in a contacts database associated with the user. A message may also be found desirable if the sender e-mail address matches the e-mail address used by the user to address an outgoing message. Yet another way for a message to be found desirable may be for key words in the e-mail subject line to match key words in a subject line of an e-mail previously sent by the user.
Various embodiments of the present invention include systems for dynamic electronic-mail filters for mobile devices. The systems may include an e-mail server, a mobile device, and a mobile e-mail gateway. Embodiments of the system may further include contacts databases and a message profile database. The contacts database may be associated with either the e-mail program or the mobile device used by the user. The message profile database may be configured to store information concerning characteristics of the outgoing e-mail messages sent by a user of a mobile device. For example, the message profile database may store information concerning the recipient e-mail addresses used by the user to address an e-mail message and key words in the subject lines of outgoing e-mail messages.
Some embodiments of the present invention include computer media and instructions for dynamic electronic-mail filters for mobile devices. Embodiments may further include instructions for allow a user to specify what kind of messages are desirable, including specifications concerning e-mail addresses of origin and key words in subject lines.
The present invention includes systems and methods for dynamic electronic-mail filters for mobile devices. Because mobile device displays are so small, a user may wish to be notified of only those e-mail messages that are urgent, time-sensitive, or otherwise desirable. E-mail messages addressed to the user are received by an e-mail server, which forwards the messages to a mobile computing device associated with the user. To make it more convenient for the user to distinguish desirable messages from unidentified spam, commercial messages, and various other types of undesirable messages, the user may be notified concerning only the desirable messages.
A network should be generally understood as a group of associated devices (e.g., computing devices) that may be communicatively connected to one another. Communications network 100 may relate a variety of computing devices coupled to one another via a variety of communications channels (e.g., mobile telephone base stations, Internet and so forth). In that regard, networks should be interpreted as being inclusive rather than exclusive.
E-mail server 110 may be any combination of computer hardware and software configured to receive and transmit e-mail messages. E-mail server 110 may be, for example, an enterprise server, such as that found in any number of corporate entities and businesses, configured to be accessed by multiple computing devices, such as computing device 130. In one example, the e-mail server 110 may be a Microsoft® Exchange® server, and computing device 130 may access e-mail on the e-mail server 110 through a client software application (not shown) such as Microsoft® Outlook®. E-mail server 110 may also store e-mail inboxes, contact lists, and various other types of data. Computing device 130 may communicate with the e-mail server 110 over a local area network (LAN) 120, which may be communicatively coupled to a wide area network (WAN) 140 such as the Internet.
LAN 120 and WAN 140 are both computer networks providing communication services to computing devices in a certain geographic area. As indicated by their names, local area network (LAN) 120 covers a small local area, in comparison to wide area network (WAN) 140 which may cover a larger geographic area. An example of LAN 120 may be a private network, such as in a home network or office network. An example of WAN 140 is the Internet. An e-mail server, such as e-mail server 110, may communicate with various computing devices in the network, such as computing device 130, through LAN 120. Computing device 130 may be any of a variety of desktop, laptop, personal computers, etc., configured to communicate with other devices through LAN 120 or WAN 140. WAN 140 further allows for communication with mobile devices, such as mobile device 160. Such communication may require the presence of a mobile e-mail gateway 150.
Mobile device 160 is inclusive of any variety of mobile devices that may communicate over the Internet. Such communication may include a wireless or landline mobile network. Mobile device 160 are inclusive of cellular telephones, smart phones, PDAs, wireless e-mail devices, handheld computers, and the like. A variety of mobile networks and communications channels for enabling Internet access are well known in the art.
In some embodiments, a mobile e-mail gateway may reside on e-mail server 110. Alternatively, communications network 100 may include a mobile e-mail gateway 150 as a separate apparatus. Mobile e-mail gateway 150 may provide mobile device 160 with message synchronization or access to e-mail messages stored on e-mail server 110. Mobile e-mail gateway 150 may further be configured to evaluate an e-mail message to determine whether the message is urgent, time-sensitive, or otherwise desirable to a particular recipient. Desirability may be based on various user specifications.
For example, a message from an e-mail address in the user's contacts database may be desirable. Other desirable messages may include, for example, a message from an e-mail address used by the user to address an outgoing message or a message with the same key words in the subject lines as an outgoing message previously or concurrently sent by the user. Operating in conjunction with e-mail server 110, mobile e-mail gateway 150 allows for a copy of the desirable message to be provided to the mobile device 160, which may also include a notification concerning the receipt of the desirable messages. Notifying the user concerning the receipt of desirable messages allows the user to quickly review an e-mail inbox on mobile device 160 without having to distinguish the desirable messages from undesirable messages.
Mobile e-mail gateway 150 allows for the desirable messages to be filtered from undesirable messages. In some embodiments, only the desirable messages are delivered to mobile device 160. Alternatively, all messages may be delivered to mobile device 160 but only the desirable messages are automatically displayed. Undesirable messages may be hidden from view until requested by the user.
Using information such as e-mail addresses in a contacts database to determine message desirability allows for updates to e-mail filtering without further effort for the user. For example, if a user adds a new contact to the contacts database, mobile e-mail gateway 150 can use the updated information in determining message desirability. In some embodiments, new e-mail addresses used by the user to address outgoing messages may be automatically added to a contacts database associated with the user. Information used to determine desirability of an e-mail message may further include key words used in subject lines or a message body. As the user sends outgoing messages, information concerning the e-mail address of the addressees, key words in subject lines or message body, and so forth may be saved and referred to later by mobile e-mail gateway 150.
In an embodiment, an e-mail message may be received by e-mail server 110 and communicated to computing device 130 through LAN 120. Further, e-mail server 110 may communicate the e-mail message to mobile device 160 using connections provided by LAN 120 and WAN 140. The e-mail message may be filtered by mobile e-mail gateway 150, which determines whether the e-mail message is desirable to the recipient based on various user specifications.
For example, a user specification designated by the user may consider e-mail from known e-mail address to be desirable. In some embodiments, the user can designate various combinations of user specifications for desirability from a list of predetermined user specifications. A copy of a desirable message is provided to mobile device 160 along with notification concerning the desirability of the message.
Contacts database 210 is a database configured to store information regarding various contacts. Such contact information may include information concerning various communication media associated with each contact, including phone numbers, e-mail addresses, IM addresses, SMS numbers/addresses, and so forth. Information in contacts database 210 may be added, deleted, and edited using, for example, a keyboard associated with computing device 130, a keypad associated with mobile device 160, automated ‘add’ options, and synchronizing operations with other contacts databases.
Message profile database 220 is a database for storing information concerning outgoing e-mail messages sent by the user. The information may include e-mail addresses used to address the message, key words in subject lines or the body of a message, and so forth. In some embodiments, such information may be gathered and stored in message profile database 220 automatically. For example, when a user sends an e-mail, information concerning the recipient e-mail address or words in the subject line of the e-mail or message body may be automatically stored in message profile database 220. Message profile database 220 may be consulted by the mobile e-mail gateway 240 for information used to determine desirability of an e-mail message.
Spam filter 230 may be any of a variety of hardware and software used to identify and process spam e-mail messages. Spam filter 230 may process an identified spam e-mail message by directing it into a folder for spam. Alternatively, spam filter 230 may automatically delete or remove spam from an e-mail inbox. Messages correctly identified as spam are generally not considered desirable. Depending on a particular spam message and spam filter, identification of a message as spam or not-spam may be incorrect. Some embodiments allow for user input in configuration of spam filter 230.
In some embodiments, e-mail server 110 may include a mobile e-mail gateway 240. The mobile e-mail gateway 240 associated with e-mail server 110 may be any combination of a variety of hardware and software for filtering e-mail messages in similar fashion as mobile e-mail gateway 150 described with respect to
Contacts database 310 and message profile database 320 may be similar to the contacts database 210 and message profile database 220, respectively, of e-mail server 110 as discussed with respect to
Optional mobile e-mail gateway 330 associated with the mobile device 160 may operate to filter e-mail messages in much the same manner as mobile e-mail gateway 240 associated with the e-mail server 110. Associating mobile e-mail gateway 330 with mobile device 160 allows for transfer of all messages to mobile device 160 and display of only the desirable messages, which may provide for a faster user experience when the user wishes to view all messages, desirable or otherwise.
Display 340 may be configured to display a user environment through which various communications applications, such as e-mail applications, can be accessed. Display 340 may include notifications concerning the user's e-mail messages. Thus, a user of mobile device 160 may access and determine the status of all his/her e-mail messages from display 340.
For example, the user might see display 340 indicating that he/she has received ten new e-mails, of which one e-mail is from an e-mail address found in contacts database 310, two e-mail messages are from an e-mail address used by the user to address an outgoing e-mail as indicated by message profile database 320, and one new e-mail has the same key words in the subject line as an outgoing e-mail sent by the user, also indicated by message profile database 320. The exact nature may be displayed as a part of an initial e-mail receipt indication or through a subsequent display or user interface. Further, the user may be able to access the six other messages through display 340 upon request. While the user may not have received a notification concerning those six e-mail messages, the user may request to view them through display 340.
In step 410, a message is received. An e-mail message sent to a recipient by a sender is received by an e-mail server 110 associated with the e-mail of the recipient. E-mail server 110 may store the e-mail message and/or forward the e-mail message to a computing device, as requested or designated by the recipient.
In step 420, the message is provided to an e-mail inbox. In this step, e-mail server 110 forwards the message to an e-mail inbox associated with the recipient. The e-mail inbox may be accessed using a computing device such as computing device 130.
In step 430, desirability of the message is determined based on a user specification. Mobile e-mail gateway filters desirable messages from undesirable messages based on various user specifications. In various embodiments, some filter specifications may be configured for use on mobile e-mail gateway. Such filter specifications may be designated by user selection and applied to incoming e-mails without further user input required. For example, a user may designate messages from e-mail addresses present in a contacts database as desirable. Mobile e-mail gateway may consult the either the contacts database associated with the e-mail server, the contacts database associated with the mobile device, or both. Other preset user specifications may include messages from an e-mail address used by the user to send an outgoing message and messages with the same key words in the subject line as outgoing messages sent by the user. A message profile database stores information concerning outgoing message and may be consulted by mobile e-mail gateway in determining desirability.
In step 440, if the message is deemed to be desirable, a copy of the desirable message is provided to a mobile device 160 associated with the user. Operating in conjunction with a mobile e-mail gateway, mobile device 160 receives a copy of the desirable message from e-mail server 110 using a network such as WAN 140.
In step 450, the user is notified of the desirable message. Notification may include a display of the desirable message, a link to a display of desirable messages, a flag or indicator alerting the user to the desirability of the messages, and so forth. Such notification allows for the user to quickly identify and access the desirable messages. The user no longer has to scroll through the clutter of undesirable messages (e.g., spam) to be able to find and respond to urgent, time-sensitive, or otherwise desirable messages. Further, undesirable messages may be withheld from delivery to mobile device 160 or they may be hidden until specifically requested by the user.
In an optional step 460, after a message is determined to be undesirable, a copy of the undesirable message is provided to the mobile device associated with the user. Instead of the message being displayed as is the case in step 450, the message is hidden from view. In some embodiments, all messages-desirable and undesirable—are provided to the mobile device automatically. Undesirable messages may be hidden from view to make it easier for the user to browse through the desirable messages. Undesirable messages may be messages that the user wants to receive but may not be urgent or time-sensitive. Providing undesirable messages allows the user to browse through them at the user's leisure.
In some embodiments, the undesirable messages may be sent to the mobile device 160 upon user request. Automatically providing the undesirable messages to the mobile device 160 allows for a faster user experience in receiving requested messages while providing the undesirable messages only upon request reduces the demand on bandwidth and battery life.
In optional step 470, the undesirable message may be displayed on the mobile device. Where hidden messages are provided to mobile device 160, the user may request that they be ‘unmasked’ and displayed. The user may customize the display on mobile device 160 to show only desirable messages, only undesirable messages, or all desirable and undesirable messages.
While the present invention has been described in connection with a series of preferred embodiment, these descriptions are not intended to limit the scope of the invention to the particular forms set forth herein. To the contrary, the present descriptions are intended to cover such alternatives, modifications, and equivalents as may be included within the spirit and scope of the invention as defined by the appended claims and otherwise appreciated by one of ordinary skill in the art.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US20030023692 *||Nov 16, 2001||Jan 30, 2003||Fujitsu Limited||Electronic message delivery system, electronic message delivery managment server, and recording medium in which electronic message delivery management program is recorded|
|US20060075028 *||Sep 7, 2004||Apr 6, 2006||Zager Robert P||User interface and anti-phishing functions for an anti-spam micropayments system|
|US20070088852 *||Jan 24, 2006||Apr 19, 2007||Zohar Levkovitz||Device, system and method of presentation of advertisements on a wireless device|
|US20070294763 *||Jun 19, 2006||Dec 20, 2007||Microsoft Corporation||Protected Environments for Protecting Users Against Undesirable Activities|
|US20080114881 *||Nov 13, 2007||May 15, 2008||Seung-Young Lee||Method and system for establishing session for message communication between converged ip messaging service client and short messaging service client|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US8010082||Oct 19, 2005||Aug 30, 2011||Seven Networks, Inc.||Flexible billing architecture|
|US8127342||Sep 23, 2010||Feb 28, 2012||Seven Networks, Inc.||Secure end-to-end transport through intermediary nodes|
|US8209709||Jul 5, 2010||Jun 26, 2012||Seven Networks, Inc.||Cross-platform event engine|
|US8229413 *||Feb 18, 2008||Jul 24, 2012||Research In Motion Limited||Message filter program for a communication device|
|US8316098||Nov 20, 2012||Seven Networks Inc.||Social caching for device resource sharing and management|
|US8356080||Jan 15, 2013||Seven Networks, Inc.||System and method for a mobile device to use physical storage of another device for caching|
|US8549587||Feb 14, 2012||Oct 1, 2013||Seven Networks, Inc.||Secure end-to-end transport through intermediary nodes|
|US8561086||May 17, 2012||Oct 15, 2013||Seven Networks, Inc.||System and method for executing commands that are non-native to the native environment of a mobile device|
|US8725746||Jun 26, 2009||May 13, 2014||Alibaba Group Holding Limited||Filtering information using targeted filtering schemes|
|US8805426||Feb 10, 2012||Aug 12, 2014||Blackberry Limited||Message filter program for a communication device|
|US8811952||May 5, 2011||Aug 19, 2014||Seven Networks, Inc.||Mobile device power management in data synchronization over a mobile network with or without a trigger notification|
|US8831561||Apr 28, 2011||Sep 9, 2014||Seven Networks, Inc||System and method for tracking billing events in a mobile wireless network for a network operator|
|US8838708 *||Aug 18, 2011||Sep 16, 2014||Google Inc.||Methods and apparatus for electronic communication filtering|
|US8855723||Sep 25, 2011||Oct 7, 2014||Peter J. Lynch, III||Temporal incoming communication notification management|
|US8868753||Dec 6, 2012||Oct 21, 2014||Seven Networks, Inc.||System of redundantly clustered machines to provide failover mechanisms for mobile traffic management and network resource conservation|
|US8874761||Mar 15, 2013||Oct 28, 2014||Seven Networks, Inc.||Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols|
|US8977755||Dec 6, 2012||Mar 10, 2015||Seven Networks, Inc.||Mobile device and method to utilize the failover mechanism for fault tolerance provided for mobile traffic management and network/device resource conservation|
|US9002828||Jan 2, 2009||Apr 7, 2015||Seven Networks, Inc.||Predictive content delivery|
|US9043433||May 25, 2011||May 26, 2015||Seven Networks, Inc.||Mobile network traffic coordination across multiple applications|
|US9043731||Mar 30, 2011||May 26, 2015||Seven Networks, Inc.||3D mobile user interface with configurable workspace management|
|US9047142||Dec 16, 2010||Jun 2, 2015||Seven Networks, Inc.||Intelligent rendering of information in a limited display environment|
|US9049179||Jan 20, 2012||Jun 2, 2015||Seven Networks, Inc.||Mobile network traffic coordination across multiple applications|
|US9055102||Aug 2, 2010||Jun 9, 2015||Seven Networks, Inc.||Location-based operations and messaging|
|US9060032||May 9, 2012||Jun 16, 2015||Seven Networks, Inc.||Selective data compression by a distributed traffic management system to reduce mobile data traffic and signaling traffic|
|US9065765||Oct 8, 2013||Jun 23, 2015||Seven Networks, Inc.||Proxy server associated with a mobile carrier for enhancing mobile traffic management in a mobile network|
|US9077630||Jul 8, 2011||Jul 7, 2015||Seven Networks, Inc.||Distributed implementation of dynamic wireless traffic policy|
|US9084105||Apr 19, 2012||Jul 14, 2015||Seven Networks, Inc.||Device resources sharing for network resource conservation|
|US9100873||Sep 14, 2012||Aug 4, 2015||Seven Networks, Inc.||Mobile network background traffic data management|
|US20100082749 *||Apr 1, 2010||Yahoo! Inc||Retrospective spam filtering|
|US20100146384 *||Apr 10, 2009||Jun 10, 2010||Microsoft Corporation||Providing selected data through a locked display|
|US20140194095 *||Jan 6, 2014||Jul 10, 2014||Wavemarket, Inc.||System and method for message identification and notification|
|WO2014201177A1 *||Jun 11, 2014||Dec 18, 2014||Seven Networks, Inc.||Offloading application traffic to a shared communication channel for signal optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols|
|Cooperative Classification||H04L51/12, H04L12/5895, H04L12/585|
|Mar 27, 2008||AS||Assignment|
Owner name: SEVEN NETWORKS, INC., CALIFORNIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BACKHOLM, ARI;VUORNOS, LAURI;REEL/FRAME:020732/0408
Effective date: 20080311
|Aug 5, 2009||AS||Assignment|
Owner name: VELOCITY FINANCIAL GROUP, INC.,MASSACHUSETTS
Free format text: SECURITY AGREEMENT;ASSIGNOR:SEVEN NETWORKS, INC.;REEL/FRAME:023044/0834
Effective date: 20090720
|Jun 27, 2015||AS||Assignment|
Owner name: SEVEN NETWORKS INC., CALIFORNIA
Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:VELOCITY FINANCIAL GROUP, INC.;REEL/FRAME:035922/0345
Effective date: 20120228